Skip to main content

Application Identification for Virtual Reality Video with Feature Analysis and Machine Learning Technique

  • Conference paper
  • First Online:
Communications and Networking (ChinaCom 2018)

Abstract

Immersive media services such as Virtual Reality (VR) video have attracted more and more attention in recent years. They are applications that typically require large bandwidth, low latency, and low packet loss ratio. With limited network resources in wireless network, video application identification is crucial for optimized network resource allocation, Quality of Service (QoS) assurance, and security management. In this paper, we propose a set of statistical features that can be used to distinguish VR video from ordinary video. Six supervised machine learning (ML) algorithms are explored to verify the identification performance for VR video application using these features. Experimental results indicate that the proposed features combined with C4.5 Decision Tree algorithm can achieve an accuracy of 98.6% for VR video application identification. In addition, considering the requirement of real-time traffic identification, we further make two improvements to the statistical features and training set. One is the feature selection algorithm to improve the computational performance, and the other is the study of the overall accuracy in respect to training set size to obtain the minimum training set size.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. IANA, http://www.iana.org/assignments/port-numbers. Accessed 06 June 2018

  2. Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. In: ACM SIGCOMM Computer Communication Review, Pennsylvania, pp. 229–240 (2005)

    Article  Google Scholar 

  3. Kim, H., Claffy, K.C., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM CoNEXT Conference, Spain, p. 11 (2008)

    Google Scholar 

  4. Andersson, R.: Classification of video traffic: an evaluation of video traffic classification using random forests and gradient boosted trees. Digitala Vetenskapliga Arkivet. 83 (2017)

    Google Scholar 

  5. Västlund, F.: Video flow classification: a runtime performance study. Digitala Vetenskapliga Arkivet. 68 (2017)

    Google Scholar 

  6. Moore, A., Zuev, D.,Crogan, M.: Discriminators for use in flow-based classification. (2013)

    Google Scholar 

  7. Yamansavascilar, B., Guvensan, M. A., Yavuz, A. G., Karsligil, M. E.: Application identification via network traffic classification. In: International Conference on ICNC, Santa Clara, pp. 843–848(2017)

    Google Scholar 

  8. Aggarwal, R., Singh, N.: A new hybrid approach for network traffic classification using SVM and Naïve Bayes algorithm. Int. J. Comput. Sci. Mobile Comput. 6, 168–174 (2017)

    Google Scholar 

  9. Williams, N., Zander, S., Armitage, G.: A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. ACM SIGCOMM Comput. Commun. Rev. 36(5), 5–16 (2006)

    Article  Google Scholar 

  10. Williams, N., Zander, S.: Evaluating machine learning algorithms for automated network application identification. (2006)

    Google Scholar 

  11. Chen, Z., Chen, R., Zhang, Y., Zhang, J., Xu, J.: A Statistical-Feature ML Approach to IP Traffic Classification Based on CUDA. In: IEEE Trustcom/BigDataSE/ISPA, Tianjin, pp. 2235–2239 (2017)

    Google Scholar 

  12. Datta, J., Kataria, N., Hubballi, N.: Network traffic classification in encrypted environment: a case study of google hangout. In: Twenty First National Conference on Communications (NCC), pp. 1–6 Mumbai, India (2015)

    Google Scholar 

  13. Munther, A., Alalousi, A., Nizam, S., Othman, R. R., Anbar, M.: Network traffic classification-A comparative study of two common decision tree methods: C4.5 and Random forest. In: International Conference on Electronic Design, pp. 210–214 Penang (2014)

    Google Scholar 

  14. Wang, C., Xu, T., Qin, X.: Network traffic classification with improved random forest. In: International Conference on Computational Intelligence and Security, pp. 78–81 Shenzhen (2015)

    Google Scholar 

  15. Wireshark, https://www.wireshark.org/. Accessed 22 May 2018

  16. WEKA: Data Mining Software in Java. https://www.cs.waikato.ac.nz/ml/weka. Accessed 26 May 2018

Download references

Acknowledgements

This work has been sponsored by Huawei Research Fund (grant No. YBN2016110032) and National Science Foundation of China (No. 61201149). The authors would also like to thank the reviewers for their constructive comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoyu Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, X., Chen, X., Wang, Y., Liu, Y. (2019). Application Identification for Virtual Reality Video with Feature Analysis and Machine Learning Technique. In: Liu, X., Cheng, D., Jinfeng, L. (eds) Communications and Networking. ChinaCom 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 262. Springer, Cham. https://doi.org/10.1007/978-3-030-06161-6_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-06161-6_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-06160-9

  • Online ISBN: 978-3-030-06161-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics